Journal of Applied Security Research最新文献

筛选
英文 中文
Developing a System of Indicators for Clustering Financial Cybercrime 开发金融网络犯罪集群指标体系
IF 1.3
Journal of Applied Security Research Pub Date : 2023-07-03 DOI: 10.1080/19361610.2021.2013112
Boris Šturc, Tatyana Gurova, N.I. Zelenkova, V. Shestak
{"title":"Developing a System of Indicators for Clustering Financial Cybercrime","authors":"Boris Šturc, Tatyana Gurova, N.I. Zelenkova, V. Shestak","doi":"10.1080/19361610.2021.2013112","DOIUrl":"https://doi.org/10.1080/19361610.2021.2013112","url":null,"abstract":"Abstract This study aims to propose a system of indicators for dividing financial cybercrime into groups. The results of this study indicate absence of taxonomic indicators regarding clustering of financial cybercrimes and wide differences in approaches to the development of such indicators in relation to cybercrimes. The proposed system of indicators for clustering of financial cybercrime is designed to help create a unified, consistent and holistic classification of cybercrime. The results of the study can be applied in the criminal legal classification of unlawful acts corresponding to the general concept of financial cybercrime.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"475 - 494"},"PeriodicalIF":1.3,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44003249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning Enabled Dynamic Spectrum Access for 6G Wireless Networks 基于机器学习的6G无线网络动态频谱接入
IF 1.3
Journal of Applied Security Research Pub Date : 2023-06-21 DOI: 10.1080/19361610.2023.2226014
S. Iyer
{"title":"Machine Learning Enabled Dynamic Spectrum Access for 6G Wireless Networks","authors":"S. Iyer","doi":"10.1080/19361610.2023.2226014","DOIUrl":"https://doi.org/10.1080/19361610.2023.2226014","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48556007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transforming Pacifists into Warmongers? Separatist Movement, State Repression, and the Politics of Framing Terrorism in Nigeria: Evidence from IPOB and Yoruba Nation’s Freedom Frontiers 把Pacifists变成Warmongers?分离主义运动、国家镇压和尼日利亚的恐怖主义政治:来自IPOB和约鲁巴民族自由阵线的证据
IF 1.3
Journal of Applied Security Research Pub Date : 2023-03-16 DOI: 10.1080/19361610.2023.2189867
J. Ojo
{"title":"Transforming Pacifists into Warmongers? Separatist Movement, State Repression, and the Politics of Framing Terrorism in Nigeria: Evidence from IPOB and Yoruba Nation’s Freedom Frontiers","authors":"J. Ojo","doi":"10.1080/19361610.2023.2189867","DOIUrl":"https://doi.org/10.1080/19361610.2023.2189867","url":null,"abstract":"While the post-9/11 event has animated how state actors frame terrorism, contemporary studies have failed to address the politics inherent in proscribing, repressing, and labeling separatist movements as terrorists. This paper explores the politics of framing terrorism using the contemporary self-determination struggles advanced by the Indigenous People of Biafra (IPOB) and the Yoruba Nation ’ s freedom frontiers. The study proposes a United Nations-coordinated global framework for regulating and evaluating states ’ activities in identifying specific groups as terrorists. Taking such a stance would prevent aggrieved agitators from being persecuted by the state in the name of terror.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44305903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Natural Experiment of the Prince Hypothesis on Classroom Vandalism 关于教室破坏行为的王子假设的自然实验
IF 1.3
Journal of Applied Security Research Pub Date : 2023-01-25 DOI: 10.1080/19361610.2023.2169545
William A. Chernoff
{"title":"A Natural Experiment of the Prince Hypothesis on Classroom Vandalism","authors":"William A. Chernoff","doi":"10.1080/19361610.2023.2169545","DOIUrl":"https://doi.org/10.1080/19361610.2023.2169545","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"1 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41753749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effects of Justice Views on Turnover Intent, Sick-Leave Views, and Sick-Leave Use Among Private Prison Staff 正义观对私立监狱员工离职意向、病假观和病假使用的影响
IF 1.3
Journal of Applied Security Research Pub Date : 2023-01-04 DOI: 10.1080/19361610.2022.2161798
E. Lambert, N. Hogan, R. Worley, Monica Solinas-Saunders
{"title":"The Effects of Justice Views on Turnover Intent, Sick-Leave Views, and Sick-Leave Use Among Private Prison Staff","authors":"E. Lambert, N. Hogan, R. Worley, Monica Solinas-Saunders","doi":"10.1080/19361610.2022.2161798","DOIUrl":"https://doi.org/10.1080/19361610.2022.2161798","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42073768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SAM: A Mechanism to Facilitate Smear-Aware Forensic Analysis of Volatile System Memory SAM:一种促进易失系统记忆Smear感知取证分析的机制
IF 1.3
Journal of Applied Security Research Pub Date : 2022-12-30 DOI: 10.1080/19361610.2022.2161972
Trushna Parida, Kanika Nath, Suvrojit Das
{"title":"SAM: A Mechanism to Facilitate Smear-Aware Forensic Analysis of Volatile System Memory","authors":"Trushna Parida, Kanika Nath, Suvrojit Das","doi":"10.1080/19361610.2022.2161972","DOIUrl":"https://doi.org/10.1080/19361610.2022.2161972","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"1 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41318590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventing Revictimization in Sexual Assault Investigations: Personal Security and Trauma-Informed Case Management* 防止性侵调查中的再次伤害:个人安全和创伤知情案例管理*
IF 1.3
Journal of Applied Security Research Pub Date : 2022-12-30 DOI: 10.1080/19361610.2022.2161799
Katalin Parti
{"title":"Preventing Revictimization in Sexual Assault Investigations: Personal Security and Trauma-Informed Case Management*","authors":"Katalin Parti","doi":"10.1080/19361610.2022.2161799","DOIUrl":"https://doi.org/10.1080/19361610.2022.2161799","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45691356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Multimedia Security Using Shortest Weight First Algorithm and Symmetric Cryptography 利用最短权优先算法和对称密码增强多媒体安全性
IF 1.3
Journal of Applied Security Research Pub Date : 2022-12-19 DOI: 10.1080/19361610.2022.2157193
Karishni Mehta, Glen Dhingra, Ramchandra S. Mangrulkar
{"title":"Enhancing Multimedia Security Using Shortest Weight First Algorithm and Symmetric Cryptography","authors":"Karishni Mehta, Glen Dhingra, Ramchandra S. Mangrulkar","doi":"10.1080/19361610.2022.2157193","DOIUrl":"https://doi.org/10.1080/19361610.2022.2157193","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48085267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ontology-Based Metrics Computation for System Security Assurance Evaluation 基于本体的系统安全保障评估度量计算
IF 1.3
Journal of Applied Security Research Pub Date : 2022-12-19 DOI: 10.1080/19361610.2022.2157190
Shao Wen, Basel Katt
{"title":"Ontology-Based Metrics Computation for System Security Assurance Evaluation","authors":"Shao Wen, Basel Katt","doi":"10.1080/19361610.2022.2157190","DOIUrl":"https://doi.org/10.1080/19361610.2022.2157190","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46514583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modified Symmetric Image Encryption Approach Based on Mixed Column and Substitution Box 基于混合列和替换盒的改进对称图像加密方法
IF 1.3
Journal of Applied Security Research Pub Date : 2022-11-30 DOI: 10.1080/19361610.2022.2150498
Vaishnavi Sawant, Ahmed Solkar, Ramchandra S. Mangrulkar
{"title":"Modified Symmetric Image Encryption Approach Based on Mixed Column and Substitution Box","authors":"Vaishnavi Sawant, Ahmed Solkar, Ramchandra S. Mangrulkar","doi":"10.1080/19361610.2022.2150498","DOIUrl":"https://doi.org/10.1080/19361610.2022.2150498","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44102271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信